NortonLifeLock Norton 360 Deluxe Antivirus security 1 license(s) 1 year(s)

SKU
21395385
£25.52 £21.27
In Stock
Norton 360 Deluxe, 50GB, 1 User, 5 Device, 1 Y, Software Micro ENR Card DVDSLV

Secure fast payment on this purchase

Free delivery on orders over £100

 
SKU 21395385
EAN 5397039099583
Manufacturer Norton
Availability Y
Summary Feature title 1 Type
Summary Feature value 1 Antivirus security
License
TypeAntivirus security
License quantity1 license(s)
Software typeLicense
License term in years1 year(s)
System requirements
Windows operating systems supportedYes
Mac operating systems supportedYes
64-bit computingYes
Mobile operating systems supportedAndroid, iOS
Technical details
64-bit computingYes
Features
TypeAntivirus security
64-bit computingYes

You may also be interested in

Compare Products
Product NortonLifeLock Norton 360 Deluxe Antivirus security 1 license(s) 1 year(s) NortonLifeLock Norton 360 Deluxe Antiv...
£25.52 £21.27
DataLocker SafeConsole Cloud Basic Device Management 1-year subscription DataLocker SafeConsole Cloud Basic Dev...
£30.91 £25.76
DataLocker SafeConsole Cloud Basic AntiMalware 1-year subscription DataLocker SafeConsole Cloud Basic Ant...
£30.91 £25.76
Compulocks T-bar Security Keyed Alike Cable Lock Black
Bestseller
Compulocks T-bar Security Keyed Alike...
£30.48 £25.40
SEQRITE Endpoint Protection Enterprise Suite
New
SEQRITE Endpoint Protection Enterprise...
£26.88 £22.40
SEQRITE Endpoint Protection Enterprise Suite SEQRITE Endpoint Protection Enterprise...
£28.22 £23.52
SKU
21395385
SCC-DEV-1
AMSCC-1
CL15KA
CENR251TO500
CENR101TO250
Description
Norton 360 Deluxe
Multiple layers of protection for devices and online privacy for the whole family.

Real-time Threat Protection for your Device
Multi-layered, advanced security helps protect against existing and emerging malware threats to your devices, and help protect your private and financial information when you go online.

Secure VPN
Browse anonymously and securely with a no-log VPN. Add bank-grade encryption to help keep your information like passwords and bank details secure and private.

Dark Web Monitoring
We monitor and notify you if we find your personal information on the Dark Web.§

Password Manager
Easily create, store, and manage your passwords, credit card information and other credentials online – safely and securely.

50GB Cloud Backup
Automatic, secure cloud backup for PCs – to store and protect important files and documents against hard drive failures, stolen devices and even ransomware.

Parental Control
Manage your kids’ activities online. Help them explore, learn, and enjoy their connected world safely.

Privacy Monitor
Find out what people-search websites have your personal information listed, and how to manually remove it.

NEW! School Time
Remote learning requires the internet, so pausing the internet on your child’s device is not an option. Manage your child’s remote learning environment and keep your child focused while school’s in session.
DataLocker SafeConsole Cloud Device Management 1-year subscription lincese

SafeConsole Cloud Device Management 1-year subscription gives you more control over encrypted USB devices, so you can maximize security, prevent data loss, and get the most from your fleet of encrypted devices.



SafeConsole Cloud Device Management is managed by SafeConsole, and works with SafeConsoleReadyâ„¢ devices.



Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft.
Monitor all your encrypted drives, including their location anywhere in the world.
See which files are saved to or deleted from your encrypted drives at any given moment.
View a complete audit trail by user, including connections, login failures, resets and loss reports.
Analyze SafeConsoleReadyâ„¢ devices, see total connections, device inventory and geolocation chart in one glance.

As a result, you are in control of all your SafeConsole ready encrypted devices, wherever they are.


DataLocker SafeConsole Cloud Device Anti-Malware 1-year subscription license

With powerful onboard anti-malware for your managed devices, automatically scan data for viruses and malware before it’s stored.


Portable Trellixâ„¢ Enterprise Anti-Malware is bundled with Device Management, a solution managed by SafeConsole.


Just enable the Anti-Malware service by applying a policy to the device using SafeConsole.
No other installation required. Anti-malware service won’t interfere with AV installed on the host computer.



Automatically scans, blocks, and removes any viruses, ransomware, worms, trojan horses, spyware, rootkits and other malware threats.
Seamlessly runs on your device in the background, protecting it from threats even if it’s outside your network.
No administrator privileges are necessary, and users and external programs cannot disable it.
When threats are detected, receive notifications in the malware scanner log.



Automatically update virus definitions provided by the award-winning Trellixâ„¢ Enterprise antivirus security updates.

Admins receive real-time reporting for threat detection through SafeConsole. In the SafeConsole admin portal, easily audit who, what, when, and where the threat occurred.



As a result, you are in control of all your SafeConsole ready encrypted devices, wherever they are.



Compulocks T-bar Security Keyed Alike Cable Lock Black
This solution provides state-of-the-art defense for your network and connected devices against today’s advanced cyber threats. It encompasses a collection of tools and practices designed to detect, prevent, and respond to malicious activities targeting endpoints. Equipped with cutting-edge features like detection scans and asset management, Seqrite Endpoint Protection ensures holistic security for enterprises’ digital assets.

Endpoint Threat Hunting
Endpoint Detection and Response (EDR) identifies and mitigates potential threats and proactively assists in reporting such incidents following compliance standards.

Comprehensive endpoint and data protection
End-to-end endpoint and data protection integrated into a single solution offer comprehensive security for businesses of any scale.

Higher scalability and enhanced security
Provides increased scalability and heightened security across Windows and Mac platforms, with added support for Linux-based systems.

Patch management
Enhances productivity and security measures with a streamlined and centralized approach to patch management.

Enhanced device control
Improved device control functionalities decrease business security risks.

Competitive security enhancements
Advanced security improvements fulfill enterprise compliance requirements.

Advanced endpoint protection
Robust antivirus, intrusion detection, firewall, and more ensure thorough endpoint protection.

Proactive scanning
Identifies unforeseen vulnerabilities and minimizes unauthorized installations with proactive scans on installed applications.

Uninterrupted protection
Protects from malicious websites, phishing attacks, and other threats.

Cloud-based access
Cloud-based access to the dashboard for imposing policies and compliance.

Connected Endpoint
Consistent asset regulation via comprehensive insights into each connected endpoint.

Application Control Safelist/Blocklist
Enforces application access restrictions following the Zero Trust methodology. Enables customization of application permissions according to the Operating System, including default OS and Seqrite applications. Provides a "Monitoring Only" mode to log application access for administrative review without blocking it.

Google and YouTube Access Controller
Restricts personal Google access while permitting corporate access based on administrator-selected account domains. Filters YouTube videos based on content categories, publisher names, and other criteria.

Endpoint Threat Hunting
Scans endpoints to identify files matching malicious hashes using Endpoint Threat Hunting (ETH). By leveraging user-provided hashes, ETH uncovers stealthy attacks and helps mitigate them before they harm the system.

Automated IoC Search
Integrates with MISP server for Threat Feeds and searches MISP File Hashes periodically; the findings are published in reports.

Real-time IoC Blocking
Submit file hashes for ongoing investigation of malicious content and real-time blocking.

Migration from v7.6
Enables smooth endpoints, users, groups, and policies migration to the new Endpoint Protection Server configuration. Additionally, it supports migration in batches or groups of endpoints for added convenience.

Rapid Query to Endpoint
Retrieves endpoints in real-time to collect information from predefined data sources on the endpoints.

File Sandboxing
Integrates with Seqrite Cloud Sandbox to analyze suspicious files for malware without any additional tool for Malware Analysis.

High Availability (HA)
High Availability guarantees continuous user access to services, applications, and data, even in the event of hardware failures and software glitches, thereby reducing system downtime.

Ransomware Protection
Utilizes Seqrite's behavior-based detection technology to identify and prevent ransomware threats and backs up data in a protected location, enabling file restoration in the event of a ransomware attack.

Advanced Device Control
Establishes device policies tailored to different device types on Windows and Mac platforms, ensuring network protection against unauthorized devices.

Web Filtering
Limits web access for employees by blocking Websites individually or as per categories.

Asset Management
Continuously monitors hardware and software configurations of every endpoint, enabling administrators to promptly detect and respond to changes within the company's systems.

Vulnerability Scan
Scans for known vulnerabilities in applications and operating systems allow users to update essential security patches promptly.

Patch Management
A centralized patch management solution addresses all Microsoft application vulnerability patching requirements.

Data Loss Prevention
Prevents financial losses by protecting confidential data and mitigating the risk of business secrets leakage. Enables scanning of data-at-rest on endpoints and removable devices.

File Activity Monitor
Meticulously oversees confidential company files, promptly alerting administrators to any copying, renaming, or deleting of such files.

IDS / IPS Protection
Proactively identifies and thwarts malicious activities exploiting application vulnerabilities.

Group Policy Management
Helps Administrators meticulously define user groups based on organizational hierarchy and establish adaptable policies tailored to situational requirements.

Spam Protection
Diligently scans endpoint inboxes for spam, phishing attacks, and unsolicited emails, bolstering defenses against email-borne threats.

Third-party Antivirus Removal
If another antivirus solution is detected during the Endpoint Protection client installation, its uninstaller will be activated or automatically removed. The installation of Seqrite EPP will not proceed until the previously installed antivirus is eliminated from the system.

Browsing Protection
Safeguards endpoint clients against attacks from malicious websites accessed within the network, fortifying defenses against web-based threats.

Phishing Protection
Prevents phishing attacks originating from malicious codes over the Internet from infiltrating the network and spreading.

Firewall Protection
Monitors inbound and outbound network traffic, allowing or disallowing applications based on defined rules, enhancing network security.

Tuneup
Enhances endpoint performance by cleaning junk files and deleting invalid registry/disk entries within the network, optimizing system efficiency.

Multiple Update Managers
Helps deploy multiple update managers to achieve load balancing and prevent network congestion, ensuring seamless distribution of updates.

Roaming Platform
The cloud-based solution enables continuous endpoint management, even outside the network, allowing administrators to maintain oversight, apply policies, and ensure compliance.

Email and SMS Notifications
Preconfigured notifications about critical network events reach appropriate parties via email or text, ensuring timely response to potential security incidents.
This solution provides state-of-the-art defense for your network and connected devices against today’s advanced cyber threats. It encompasses a collection of tools and practices designed to detect, prevent, and respond to malicious activities targeting endpoints. Equipped with cutting-edge features like detection scans and asset management, Seqrite Endpoint Protection ensures holistic security for enterprises’ digital assets.

Endpoint Threat Hunting
Endpoint Detection and Response (EDR) identifies and mitigates potential threats and proactively assists in reporting such incidents following compliance standards.

Comprehensive endpoint and data protection
End-to-end endpoint and data protection integrated into a single solution offer comprehensive security for businesses of any scale.

Higher scalability and enhanced security
Provides increased scalability and heightened security across Windows and Mac platforms, with added support for Linux-based systems.

Patch management
Enhances productivity and security measures with a streamlined and centralized approach to patch management.

Enhanced device control
Improved device control functionalities decrease business security risks.

Competitive security enhancements
Advanced security improvements fulfill enterprise compliance requirements.

Advanced endpoint protection
Robust antivirus, intrusion detection, firewall, and more ensure thorough endpoint protection.

Proactive scanning
Identifies unforeseen vulnerabilities and minimizes unauthorized installations with proactive scans on installed applications.

Uninterrupted protection
Protects from malicious websites, phishing attacks, and other threats.

Cloud-based access
Cloud-based access to the dashboard for imposing policies and compliance.

Connected Endpoint
Consistent asset regulation via comprehensive insights into each connected endpoint.

Application Control Safelist/Blocklist
Enforces application access restrictions following the Zero Trust methodology. Enables customization of application permissions according to the Operating System, including default OS and Seqrite applications. Provides a "Monitoring Only" mode to log application access for administrative review without blocking it.

Google and YouTube Access Controller
Restricts personal Google access while permitting corporate access based on administrator-selected account domains. Filters YouTube videos based on content categories, publisher names, and other criteria.

Endpoint Threat Hunting
Scans endpoints to identify files matching malicious hashes using Endpoint Threat Hunting (ETH). By leveraging user-provided hashes, ETH uncovers stealthy attacks and helps mitigate them before they harm the system.

Automated IoC Search
Integrates with MISP server for Threat Feeds and searches MISP File Hashes periodically; the findings are published in reports.

Real-time IoC Blocking
Submit file hashes for ongoing investigation of malicious content and real-time blocking.

Migration from v7.6
Enables smooth endpoints, users, groups, and policies migration to the new Endpoint Protection Server configuration. Additionally, it supports migration in batches or groups of endpoints for added convenience.

Rapid Query to Endpoint
Retrieves endpoints in real-time to collect information from predefined data sources on the endpoints.

File Sandboxing
Integrates with Seqrite Cloud Sandbox to analyze suspicious files for malware without any additional tool for Malware Analysis.

High Availability (HA)
High Availability guarantees continuous user access to services, applications, and data, even in the event of hardware failures and software glitches, thereby reducing system downtime.

Ransomware Protection
Utilizes Seqrite's behavior-based detection technology to identify and prevent ransomware threats and backs up data in a protected location, enabling file restoration in the event of a ransomware attack.

Advanced Device Control
Establishes device policies tailored to different device types on Windows and Mac platforms, ensuring network protection against unauthorized devices.

Web Filtering
Limits web access for employees by blocking Websites individually or as per categories.

Asset Management
Continuously monitors hardware and software configurations of every endpoint, enabling administrators to promptly detect and respond to changes within the company's systems.

Vulnerability Scan
Scans for known vulnerabilities in applications and operating systems allow users to update essential security patches promptly.

Patch Management
A centralized patch management solution addresses all Microsoft application vulnerability patching requirements.

Data Loss Prevention
Prevents financial losses by protecting confidential data and mitigating the risk of business secrets leakage. Enables scanning of data-at-rest on endpoints and removable devices.

File Activity Monitor
Meticulously oversees confidential company files, promptly alerting administrators to any copying, renaming, or deleting of such files.

IDS / IPS Protection
Proactively identifies and thwarts malicious activities exploiting application vulnerabilities.

Group Policy Management
Helps Administrators meticulously define user groups based on organizational hierarchy and establish adaptable policies tailored to situational requirements.

Spam Protection
Diligently scans endpoint inboxes for spam, phishing attacks, and unsolicited emails, bolstering defenses against email-borne threats.

Third-party Antivirus Removal
If another antivirus solution is detected during the Endpoint Protection client installation, its uninstaller will be activated or automatically removed. The installation of Seqrite EPP will not proceed until the previously installed antivirus is eliminated from the system.

Browsing Protection
Safeguards endpoint clients against attacks from malicious websites accessed within the network, fortifying defenses against web-based threats.

Phishing Protection
Prevents phishing attacks originating from malicious codes over the Internet from infiltrating the network and spreading.

Firewall Protection
Monitors inbound and outbound network traffic, allowing or disallowing applications based on defined rules, enhancing network security.

Tuneup
Enhances endpoint performance by cleaning junk files and deleting invalid registry/disk entries within the network, optimizing system efficiency.

Multiple Update Managers
Helps deploy multiple update managers to achieve load balancing and prevent network congestion, ensuring seamless distribution of updates.

Roaming Platform
The cloud-based solution enables continuous endpoint management, even outside the network, allowing administrators to maintain oversight, apply policies, and ensure compliance.

Email and SMS Notifications
Preconfigured notifications about critical network events reach appropriate parties via email or text, ensuring timely response to potential security incidents.
Short Description
Norton 360 Deluxe, 50GB, 1 User, 5 Device, 1 Y, Software Micro ENR Card DVDSLV
SafeConsole Cloud Device Management license (per device) 1-year subscription
SafeConsole Cloud Anti-Malware license for one device - 1-year subscription
Compulocks T-bar Security Keyed Alike Cable Lock Black
Endpoint Protection Enterprise Suite, 251 - 500, 1 Year
Endpoint Protection Enterprise Suite, 101 - 250, 1 Year
Manufacturer
Norton
DataLocker
DataLocker
Compulocks
Seqrite
Seqrite